Connect with us

Innovation and Technology

Signals

Published

on

Signals

From Signal to Systems Failure

When The Atlantic’s Jeffrey Goldberg published the now-infamous account of being added — accidentally and silently — to a Signal chat involving Vice President JD Vance, Secretary of Defense Pete Hegseth, Director of National Intelligence Tulsi Gabbard and others, it sparked national outrage. The chat wasn’t just idle chatter — it included timestamped details about drone launches and missile strikes in Yemen. Goldberg, unaware of the gravity of what he was reading at first, later confirmed that he had a front-row seat to real-time discussions of imminent military action.

The Venmo Vectors and Open-Source Oversights

Following Signalgate, Wired reported that National Security Adviser Michael Waltz had his Venmo account set to public, exposing a network of 328 connections — including journalists, military officers and government staffers. Among them: active members of the National Security Council. It’s not just about who paid whom for tacos or splitting a hotel bill — it’s about network mapping. Foreign intelligence services couldn’t ask for a more convenient way to build a social graph of top U.S. officials.

Why This Is Worse Than It Looks

It’s easy to laugh off a public Venmo account or an outdated contact list. But in the hands of a nation-state adversary or a well-funded cybercriminal syndicate, this data becomes a weapon. Here’s how:

  • Social Graph Mapping: By analyzing who officials are connected to, adversaries can identify secondary targets who may have weaker defenses but high-value access — staffers, family members, assistants.
  • Phishing with Context: A phishing email from a random sender is easy to ignore. One that appears to come from a known colleague or friend — referencing a recent payment or shared trip — is far more convincing.
  • Credential Harvesting and Pivot Attacks: A compromised assistant’s inbox can lead to calendar invites, shared docs or even credentials that open more sensitive systems. The attacker doesn’t start at the top — they work their way there, one trusted contact at a time.
  • Extortion and Leverage: Knowing an official’s inner circle and routines gives adversaries ammunition for coercion — whether it’s exploiting embarrassing personal connections or threatening to expose operational lapses.

The Culture Problem Behind the Cyber Problem

The Signalgate scandal, combined with these broader exposures, reflects a culture problem.

What Needs to Happen Now

To prevent future incidents like Signalgate — or worse — several things need to happen:

  • Mandatory Cyber Hygiene Training for Government Officials: If a mid-level employee at a tech company can be required to pass annual security training, so should every cabinet member and political appointee.
  • Strict Communication Protocols: Government communications involving operational or classified content must be conducted through approved, monitored systems — not convenience-first consumer apps.
  • Aggressive Open-Source Intelligence Audits: Officials should undergo regular reviews of their digital footprint to identify and remediate exposed information — before an adversary uses it.
  • A Security-First Mindset: Cybersecurity cannot be relegated to IT departments. It must be part of every decision — from how apps are used to how networks are built and how people connect.

Every Breadcrumb Matters

Signalgate didn’t happen because of some masterful hack or a catastrophic zero-day exploit. It appears to have happened because someone fat-fingered a phone number. It’s a chilling reminder that even at the highest levels of power, the smallest mistakes can have enormous consequences.

Conclusion

Every bit of data — every contact, payment, message or connection — is a piece of a puzzle. And once an adversary has enough of those pieces, they can see the whole picture clearly. Cybersecurity isn’t just about protecting secrets — it’s about protecting the ordinary details that, when combined, become extraordinary vulnerabilities.

FAQs

  • What is the main issue with the Signalgate scandal?
    • The main issue is that government officials are conducting sensitive communications on personal devices, which can be vulnerable to hacking and exploitation.
  • What is the significance of the Venmo account being set to public?
    • The significance is that it exposes a network of connections, including journalists, military officers and government staffers, which can be used by foreign intelligence services to build a social graph of top U.S. officials.
  • What are the potential consequences of these digital hygiene failures?
    • The potential consequences include social graph mapping, phishing with context, credential harvesting and pivot attacks, and extortion and leverage.
  • What needs to happen to prevent future incidents like Signalgate?
    • Mandatory cyber hygiene training, strict communication protocols, aggressive open-source intelligence audits, and a security-first mindset are necessary to prevent future incidents.

Innovation and Technology

Innovating for Impact: How Social Enterprises are Leveraging Tech for Good

Published

on

Innovating for Impact: How Social Enterprises are Leveraging Tech for Good

Technology for social change is revolutionizing the way we address global challenges, and social enterprises are at the forefront of this movement. By harnessing the power of technology, these organizations are creating innovative solutions to some of the world’s most pressing problems. From healthcare and education to environmental sustainability and economic development, social enterprises are leveraging tech to drive positive impact and improve lives.

The Rise of Social Enterprises

Social enterprises are businesses that prioritize social and environmental impact alongside financial returns. These organizations are driven by a mission to create positive change and address specific social or environmental challenges. With the rise of social entrepreneurship, we are seeing a new generation of leaders who are using business as a force for good. They are leveraging technology to scale their impact, reach new audiences, and create sustainable solutions to complex problems.

Key Characteristics of Social Enterprises

Social enterprises are characterized by their commitment to social and environmental impact, innovative approaches to problem-solving, and sustainable business models. They often use technology to amplify their impact, whether through digital platforms, mobile apps, or data analytics. By leveraging technology, social enterprises can reach more people, reduce costs, and improve the effectiveness of their programs.

The Role of Technology in Social Impact

Technology is a key enabler of social impact, providing social enterprises with the tools and platforms they need to scale their work and reach new audiences. From mobile health apps to online education platforms, technology is being used to address some of the world’s most pressing challenges. Social enterprises are leveraging technology to collect data, analyze trends, and develop targeted solutions to specific social and environmental problems.

Examples of Tech for Social Good

There are many examples of social enterprises using technology to drive social impact. For instance, mobile health apps are being used to diagnose and treat diseases in remote communities, while online platforms are providing access to education and job training for marginalized groups. Additionally, data analytics is being used to track climate change, identify areas of high conservation value, and develop targeted conservation strategies.

Impact of Social Enterprises on Society

Social enterprises are having a profound impact on society, from improving health and education outcomes to promoting environmental sustainability and economic development. By leveraging technology, these organizations are able to reach more people, reduce costs, and improve the effectiveness of their programs. Social enterprises are also creating new opportunities for employment, entrepreneurship, and social mobility, particularly in marginalized communities.

Measuring Social Impact

Measuring social impact is critical to understanding the effectiveness of social enterprises and identifying areas for improvement. Social enterprises use a range of metrics to measure their impact, from outcome-based metrics such as health outcomes or educational attainment, to process-based metrics such as website traffic or social media engagement. By tracking their impact, social enterprises can refine their strategies, optimize their programs, and scale their impact over time.

Challenges and Opportunities

While social enterprises are making a significant impact, they also face a range of challenges, from funding and scalability to regulation and talent acquisition. However, these challenges also present opportunities for innovation and growth, as social enterprises leverage technology to overcome obstacles and achieve their goals. By embracing digital technologies, social enterprises can reduce costs, improve efficiency, and increase their impact.

Future of Social Enterprises

The future of social enterprises is exciting and uncertain, as these organizations continue to innovate and evolve in response to changing social and environmental challenges. As technology continues to advance, we can expect to see even more innovative solutions to social and environmental problems, from artificial intelligence and blockchain to the Internet of Things and virtual reality. By leveraging these technologies, social enterprises will be able to drive even greater impact and create a more sustainable, equitable, and just world.

Conclusion

In conclusion, social enterprises are leveraging technology to drive social impact and improve lives. From healthcare and education to environmental sustainability and economic development, these organizations are creating innovative solutions to some of the world’s most pressing challenges. By harnessing the power of technology, social enterprises are able to scale their impact, reach new audiences, and create sustainable solutions to complex problems. As the social enterprise sector continues to grow and evolve, we can expect to see even more innovative solutions to social and environmental challenges, and a brighter future for all.

Frequently Asked Questions

What is a social enterprise?

A social enterprise is a business that prioritizes social and environmental impact alongside financial returns. These organizations are driven by a mission to create positive change and address specific social or environmental challenges.

How do social enterprises use technology?

Social enterprises use technology to amplify their impact, whether through digital platforms, mobile apps, or data analytics. By leveraging technology, social enterprises can reach more people, reduce costs, and improve the effectiveness of their programs.

What are some examples of social enterprises using technology for social good?

There are many examples of social enterprises using technology to drive social impact, from mobile health apps to online education platforms. Additionally, data analytics is being used to track climate change, identify areas of high conservation value, and develop targeted conservation strategies.

How can I get involved in the social enterprise sector?

There are many ways to get involved in the social enterprise sector, from volunteering or interning with a social enterprise to starting your own social enterprise. You can also support social enterprises by donating to their causes or purchasing their products and services.

What is the future of social enterprises?

The future of social enterprises is exciting and uncertain, as these organizations continue to innovate and evolve in response to changing social and environmental challenges. As technology continues to advance, we can expect to see even more innovative solutions to social and environmental problems, and a brighter future for all.

Continue Reading

Innovation and Technology

Survey Says 67% Of Jobs Use AI, But Do Leaders Understand Its Limits?

Published

on

Survey Says 67% Of Jobs Use AI, But Do Leaders Understand Its Limits?

Introduction to AI in the Workplace

In a survey of 1,000 knowledge workers, 67% of respondents said that their companies use AI, with 56% of companies encouraging AI usage. Owl Labs created the survey, and they found that Gen Z employees are more likely to report being “heavily reliant” on AI, with 70% of the youngest generation leaning in on the tech for a multitude of tasks. That lines up with the observations of OpenAI CEO, Sam Altman, who recently shared that Gen Z workers view ChatGPT as a “life adviser". Embracing technology is a good idea, but is Gen Z squeezing LLMs too tightly? What do these current and future workforce leaders need to know, about what AI can (and can’t) do?

Tell Me How You Use ChatGPT and I’ll Guess Your Age

“Older people,” Altman told an audience at Sequoia Capital’s AI Ascent Event, “use ChatGPT as a Google replacement. People in college use it as an operating system.” Tech Crunch reports that younger adults have fairly complex prompts memorized, which also means saved in the notes on their phone, and they rapidly and frequently pepper the program with problems and queries. Altman goes on to say that, "they [Gen Z and Gen Alpha] don’t really make life decisions without asking ChatGPT what they should do. It has the full context on every person in their life and what they’ve talked about."

AI expert Amanda Caswell, a writer for Tom’s Guide, says, “Personally, I’ve used ChatGPT to tackle everything from project summaries to panic attacks, and have found it to be a great sounding board when facing tough choices. While it’s no substitute for human guidance or a therapist, ChatGPT can be a great assistant in a pinch.”

The Upside and Downside of Using AI

There’s definitely an upside to having a second opinion on various aspects of your life and work – especially when that perspective has access to trillions of data points, the works of Freud, Jung, and James, as well as most of recorded history. But there are risks that can come with using AI, and leaning in too heavily on the platform. Experts say that it’s essential to be careful how much you share with AI – and how you use the tool at work. The rewards are many, but so are the risks – and using LLMs wisely is good counsel for every generation.

What to Watch Out For With AI: Experts Weigh In

“AI has no world model,” according to process scientist, Sam Drauschak. Questions that require real-world context can be a challenge for ChatGPT and other AI platforms. “When you ask it to read this picture of a clock, it’s strictly pattern prediction.”

Louis Rosenberg, Stanford professor, inventor, AI scientist and author of Our Next Reality, says that sometimes AI is dyslexic. And, as someone who is dyslexic, Rosenberg’s perspective gives an interesting read on why AI struggles to tell time. “When I recall things in my mind (objects, environments, images, or text), I don’t visualize them from a fixed first-person perspective. I think about them from all directions at once, more as a vague cloud of perspectives than a single, grounded orientation,” he explains – articulating the AI point of view. That’s how large language models see things – and it often means that vector orientations (such as “clockwise”) are elusive to AI platforms. “When you ask AI to interpret a tissue sample," he says, using an application from healthcare that is becoming more and more common, “accuracy is not impacted by orientation.”

But innovative problem-solving and creative thinking is. While AI can generate novel combinations for text and produce creative works in art and music, its capacity for truly original thought and breakthrough innovation remains limited. But the speed of the platform can be astonishing. So, should we treat AI like just another voice in the room, or the voice of God? “Think about it more like an intern,” Drauschak advises.

“AI doesn’t do anything new. It can synthesize things from lots of different domains. And the labor of synthesizing things can seem to generate insight. Like a brilliant intern – with the ability to process billions of data points at once – it’s going to come up with good ideas and contribute. But it’s a really good idea to check on the work,” he explains. While you may not be asking AI to read a clock, perspective always matters – especially when it comes to work product, context and point of view.

Room for Error with AI

AI doesn’t possess emotions or empathy, Draushak explains. “It doesn’t have a conversation where it acknowledges any sort of room for error or humility or, you know, ‘I only feel 80% about this’". Drauschak likens it to the consultant’s mantra: “I may be incorrect, but I’m never unsure of myself.” Hallucinations and facts are presented with the same level of confidence.

AI has no world model, so anything that requires real-time context creates progressive levels of failure, according to Drauschak. Long-term planning can be a challenge as well, as AI platforms have limited memory. To be fair, certain programs and prompts can provide reference and context – a context which comes to human beings naturally, as a result of being in the real world.

And reading the room is a challenge for AI. “AI is the future,” Dylan Matthews shares in Vox. “It’ just can’t predict it.” Science Daily echoes that sentiment, in a post that proclaims that humans are better at predicting social interactions than AI. "AI for a self-driving car, for example, would need to recognize the intentions, goals, and actions of human drivers and pedestrians. You would want it to know which way a pedestrian is about to start walking, or whether two people are in conversation versus about to cross the street," said lead author Leyla Isik, an assistant professor of cognitive science at Johns Hopkins University who did an extensive study into the limitations of current LLMs. "Any time you want an AI to interact with humans, you want it to be able to recognize what people are doing. I think this sheds light on the fact that these systems can’t right now." Cathy Garcia, a colleague and contributor to the Johns Hopkins study, says, "Real life isn’t static. We need AI to understand the story that is unfolding in a scene. Understanding the relationships, context, and dynamics of social interactions is the next step, and this research suggests there might be a blind spot in AI model development."

Leading with AI: Understanding Its Limits to Access Its Capabilities

For leaders and aspiring leaders, the message is one of balance. While the capabilities of AI have opened up seemingly limitless possibility, those possibilities actually do have limits. The real question, across every generation in the workforce, is: what do you want to outsource to AI? Tools can accelerate results when used correctly. But turning to AI for every direction in your life seems unwise. Indeed, research already shows a decline in cognitive skills from over-reliance on LLMs. Convenience, speed, ease: these are the advantages of AI. But understanding how best to use an AI platform like ChatGPT is crucial for leaders today.

In side by side tournaments run by Metaculus, human beings have beaten AI at forecasting for the last three quarters running. But that gap is narrowing. Think of how prediction matters in your business: for lawyers, negotiating a settlement requires instincts around agreement based on real-time contexts – and intuition. Producers at Netflix predict what shows will hit. Intuition, innovation, direction: these uniquely human characteristics still matter in decision-making – even when 67% of workers are using ChatGPT and its cousins. AI can help with the predictive journey, but it’s not the whole trip – at least, not yet.

Conclusion

The use of AI in the workplace is on the rise, with 67% of companies using AI and 56% encouraging its use. While AI can be a powerful tool, it’s essential to understand its limitations and use it wisely. Gen Z employees are more likely to rely heavily on AI, but it’s crucial for all generations to be aware of the potential risks and benefits. By understanding what AI can and can’t do, leaders and aspiring leaders can make informed decisions about how to use AI to accelerate results and improve productivity.

FAQs

Q: What percentage of companies use AI?
A: 67% of companies use AI, according to a survey by Owl Labs.
Q: What is the main difference in how older and younger generations use ChatGPT?
A: Older people use ChatGPT as a Google replacement, while younger adults use it as an operating system.
Q: What are some limitations of AI?
A: AI has no world model, limited memory, and struggles with real-time context, innovative problem-solving, and creative thinking.
Q: Can AI predict social interactions?
A: No, humans are better at predicting social interactions than AI, according to research by Johns Hopkins University.
Q: What is the importance of understanding AI’s limitations?
A: Understanding AI’s limitations is crucial for leaders and aspiring leaders to make informed decisions about how to use AI to accelerate results and improve productivity, and to avoid over-reliance on AI.

Continue Reading

Innovation and Technology

Ransomware Hackers Are Watching You

Published

on

Ransomware Hackers Are Watching You

The ransomware threat is evolving, and attackers are continually seeking new angles and technologies to exploit, to aid with leveraging payments in these modern-day extortion schemes. Some are hard to fathom, like the DOGE-trolling hackers demanding $1 trillion, exploiting zero-day vulnerabilities in Windows, and the increasingly common use of 2FA bypass attacks and access to 19 billion compromised passwords on the dark web. But what if ransomware hackers were using employee monitoring software to see what you are up to during the attack and to steal your credentials as well? Welcome to the sinister world of Qilin and Hunters International ransomware.

How Ransomware Attackers Can Spy On You

While the Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency have recently issued a security alert about the dangers that unsophisticated threat actors pose to U.S. critical infrastructure services, that doesn’t mean all ransomware hackers are using the kind of basic and elementary intrusion techniques described in the CISA advisory. Take the Qilin and Hunters International ransomware threat, whose affiliates have been observed using a legitimate employee monitoring tool during their attacks.

The Qilin and Hunters International Ransomware Attack

The ransomware attacks in question started with malicious Google Ads deployed by the threat actors. These were designed to display “when people searched for RVTools, a free Windows utility for managing VMware vSphere deployments,” Sergiu Gatlan at Bleeping Computer, said. If the would-be victim clicked through that advert then it started a waterfall of nefarious events leading to the download and installation of something called Kickidler.

Kickidler: A Legitimate Employee Monitoring Tool Turned Malicious

Here’s the thing: Kickidler is not malware. In fact, it’s a perfectly legitimate employee monitoring tool that’s deployed by more than 5,000 organizations across the world. The key point of interest is that it provides a visual monitoring capability. Once installed, the ransomware hackers can literally see what you are doing.

Consequences of the Attack

Varonis threat research investigators have suggested that the ransomware attackers have used the software in order to have undetected access to target systems for weeks at a time, enabling the collection of the credentials required to gain access to critical off-site cloud data backups. It is recommended, therefore, that network defenders ensure the effective and regular auditing of any installed remote monitoring and management software.

Conclusion

The Qilin and Hunters International ransomware attack is a stark reminder of the evolving nature of cyber threats. As attackers become more sophisticated, it’s essential for organizations to stay vigilant and take proactive measures to protect themselves. By understanding the tactics used by these attackers, we can better equip ourselves to prevent such attacks and minimize their impact.

Frequently Asked Questions

Q: What is Qilin and Hunters International ransomware?

A: Qilin and Hunters International is a type of ransomware that uses a legitimate employee monitoring tool to spy on victims and steal their credentials.

Q: How does the attack start?

A: The attack starts with malicious Google Ads that lead to the download and installation of the Kickidler employee monitoring tool.

Q: What is Kickidler?

A: Kickidler is a legitimate employee monitoring tool that provides visual monitoring capability, which can be used by ransomware attackers to spy on victims.

Q: How can organizations protect themselves?

A: Organizations can protect themselves by ensuring the effective and regular auditing of any installed remote monitoring and management software and being cautious when clicking on online ads.

Continue Reading
Advertisement

Our Newsletter

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Trending